Encryption, Privacy & Free Speech: An April Recap
from the looking-back dept
As part of our funding campaign for our coverage of encryption, we reached out to some companies that care about these issues to ask them to show their support. Today, we're taking a look back at a series of four posts sponsored by Golden Frog, a company dedicated to online privacy, security and freedom.
California's Anti-Encryption Bill: At the beginning of April, we called attention to a bill in California that had gone from bad to worse. Originally a ban on smartphone encryption, it was tinkered with until it became a requirement for encryption backdoors, which could have forced manufacturers to create special California versions of their products with weakened security. Though obviously not as high-profile or as far-reaching as the Burr/Feinstein encryption bill in Senate, it was ultimately the same thing: a wrongheaded attack on device security framed as a necessity for law enforcement, despite that being a very unconvincing notion.
Thankfully, California lawmakers seem to have come to their senses on this one. The bill died without a vote a week later, after the Assembly Committee on Privacy and Consumer Protection realized what a terrible idea it was.
From the Golden Frog Blog: We Agree With Apple — We Can’t Set The Precedent Of An iPhone "Backdoor"
A Scary Thought Experiment About The NSA: A few weeks ago, Glyn Moody called our attention to a fantastic (if somewhat disturbing) presentation from 2014, breaking down some ways the NSA could infiltrate our digital networks at the most basic and undetectable level. This notion remains hypothetical but all-too-conceivable, especially when there have been plenty of examples of companies cooperating with the government and the intelligence community without being tricked into doing so.
From the Golden Frog Blog: AT&T, Shame on You for Helping the NSA Spy on Us
The USTR Comes (Partly) To Its Senses: The USTR's history with internet policy and digital innovation has always been, to put it mildly, discouraging. So we were surprised to see a change of tune in this year's National Trade Estimate report, which called out internet censorship in China and Pakistan as serious barriers to innovation and free expression, and even pointed out the myriad dangers of the EU's Digital Single Market strategy and the problems with a "Google tax". This is still far from a total about-face for the USTR, with the very same report managing to contradict itself when it came to intellectual property issues — but it's a very welcome step in the right direction.
From the Golden Frog Blog: EU Reforms Data Protection and Privacy Rules in Huge Overhaul
Snowden's Positive Impact On Encryption Adoption: National Intelligence Director James Clapper thought he was decrying Edward Snowden when he pointed out that his actions massively accelerated the adoption of encryption technology, shaving years off the NSA's estimated timeline — but those of us who value data security and internet freedom had a different takeaway, and considered it yet another example of the good Snowden's revelations have done. The whole thing really highlighted the mismatched priorities and values between the intelligence community and the American public (as if that needed any more highlighting).
From the Golden Frog Blog: Encryption Fundamentals: What Everyone Should Know
We'd like to thank Golden Frog for supporting our coverage of these critical issues relating to security, privacy and encryption. As you've likely noticed, their blog is full of great content that also explores these topics. In addition to the links we've featured so far, here are some more posts that may be of interest to Techdirt readers:
Privacy & Security on the Golden Frog Blog:
VyprVPN from Golden Frog is the world's fastest highly-secure VPN.
Get 25% off VyprVPN now »
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: encryption, free speech, privacy, sponsored post
Reader Comments
Subscribe: RSS
View by: Time | Thread
The myth debunking link seems biased
First they argue that the state given direct access to major routers can easily perform a traffic correlation attack on Tor, and get the rest by adding what Tor calls "a bad apple" to the network to deanonymise the rest. The striking thing here is that it could be easier to perform a somewhat similar attack on VPNs like there's.
Furthermore while that article points out that we can't necessarily trust a company when the say we're anonymous, I would push back that often there's no practical alternative.
So to summarise it: modern security is far from perfect, so just settle for a VPN. While any decent security export would endorse the prior, the latter doesn't follow and for my money Tor's still better then VPNs.
[ link to this | view in chronology ]
Re: The myth debunking link seems biased
The Golden Frog appears to be mostly a toad, or at least a toady in this case.
[ link to this | view in chronology ]
Techdirt is really selling out by not making sure their sponsored partner is really a good one
[ link to this | view in chronology ]